|
IEEE Transactions on Cloud Computing |
1. The Impact of Review Environment on Review Credibility |
|
|
|
2. Private Over-threshold Aggregation Protocols over Distributed Datasets |
|
|
|
3. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis |
|
|
|
4. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing |
|
|
|
5. Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
|
|
|
6. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing |
|
|
|
7. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud |
|
|
|
8. Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
|
|
|
9. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates |
|
|
|
10. Providing User Security Guarantees in Public Infrastructure Clouds |
|
|
|
|
|
|
|
|